Patents by Inventor Krzysztof Rudek
Krzysztof Rudek has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 10929271Abstract: A method for finding the cause of an error or unexpected behavior of a software application includes providing a list of steps to be executed in order to achieve a certain behavior of the application in a usage scenario and providing a decision tree corresponding with the usage scenario. The decision tree comprises decision nodes that correspond with the steps in the sequence of steps to be executed and leaf nodes indicating one or more possible solutions. The method includes scanning log files to determine whether a step in the list of steps to be executed has not been executed and traversing the decision tree when a step in the list of steps has not been executed. A leaf node of the decision tree that corresponds to a non-executed step is determined and a solution is extracted from the determined leaf node.Type: GrantFiled: April 30, 2019Date of Patent: February 23, 2021Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Chitra A. Iyer, Angelika Kozuch, Krzysztof Rudek, Vinod A. Valecha
-
Patent number: 10891365Abstract: Approaches presented herein enable restricting access to a locked computing resource in a web browser with a user-tailored CAPTCHA. More specifically, a request for a CAPTCHA is obtained from a web browser of a user attempting to access a resource. A set of terms associated with the user are selected from a pool of terms collected from an environment of the user within a pre-determined time period. A familiarity value of the selected terms indicating a recognizability of the terms by the user is determined. A CAPTCHA of the selected set of terms is generated having a level of graphic noise corresponding to the familiarity value. The generated CAPTCHA is then sent to the web browser. When a response to the CAPTCHA is received from the web browser, it is analyzed to determine whether the response matches the selected set of terms. If so, the web browser is instructed to grant the user access to the resource.Type: GrantFiled: July 25, 2019Date of Patent: January 12, 2021Assignee: International Business Machines CorporationInventors: Konrad Wojciech Komnata, Grzegorz Piotr Szczepanik, Tomasz Hanusiak, Krzysztof Rudek
-
Patent number: 10841329Abstract: A mechanism is provided in a data processing system comprising at least one processor and at least one memory, the at least one memory comprising instructions which are executed by the at least one processor and configure the processor to implement a cognitive security system. The cognitive security system generates a violation array. Each entry of the violation array represents identification of a workflow activity that violates a security policy. Responsive to a new workflow orchestration being created by a user, the cognitive security system compares each activity of the new workflow orchestration to the violation array. Responsive to determining a given activity of the new workflow orchestration exists in the violation array, the cognitive security system recommends to the user to remove the given activity from the new workflow orchestration.Type: GrantFiled: August 23, 2017Date of Patent: November 17, 2020Assignee: International Business Machines CorporationInventors: Vinod A. Valecha, Krzysztof A. Rudek, Markus Blohberger
-
Patent number: 10795982Abstract: Approaches presented herein enable restricting access to a locked computing resource in a web browser with a user-tailored CAPTCHA. More specifically, a request for a CAPTCHA is obtained from a web browser of a user attempting to access a resource. A set of terms associated with the user are selected from a pool of terms collected from an environment of the user within a pre-determined time period. A familiarity value of the selected terms indicating a recognizability of the terms by the user is determined. A CAPTCHA of the selected set of terms is generated having a level of graphic noise corresponding to the familiarity value. The generated CAPTCHA is then sent to the web browser. When a response to the CAPTCHA is received from the web browser, it is analyzed to determine whether the response matches the selected set of terms. If so, the web browser is instructed to grant the user access to the resource.Type: GrantFiled: August 23, 2018Date of Patent: October 6, 2020Assignee: International Business Machines CorporationInventors: Konrad Wojciech Komnata, Grzegorz Piotr Szczepanik, Tomasz Hanusiak, Krzysztof Rudek
-
Publication number: 20200293514Abstract: Systems and methods for managing access to data in a network are provided. In embodiments, a method includes: receiving, by a computer device, a search request regarding data of a participant, the search request including participant parameters associated with the participant; generating, by the computer device, a record of data associated with the participant based on the search request; sending, by the computer device, a request for data to third party nodes of a blockchain system based on the search request and the record; receiving, by the computer device, results from the blockchain system, the results including at least one set of data from a first node of the third party nodes; and determining, by the computer device, that the set of data requires updating based on the results.Type: ApplicationFiled: March 12, 2019Publication date: September 17, 2020Inventors: Krzysztof RUDEK, Vinod A. VALECHA, Grzegorz Piotr SZCZEPANIK, Lukasz Jakub PALUS
-
Patent number: 10762213Abstract: A method and system for improving memory storage and threat detection is provided. The method includes requesting and authorizing permission for executing analysis code for determining if a service device is in compliance with general data protection regulations. In response, executable code is uploaded to the database hardware controller and a first database and a second database is analyzed with respect to patterns associated with the general data protection regulations. Associated results code is generated and transmitted the service device. The results code is executed with respect to the first database and the second database resulting in a storage space increase in the first database and the second database thereby improving operational functions of the first database and the second database.Type: GrantFiled: October 24, 2018Date of Patent: September 1, 2020Assignee: International Business Machines CorporationInventors: Krzysztof Rudek, Grzegorz P. Szczepanik, Lukasz Jakub Palus, Tomasz Hanusiak
-
Publication number: 20200174966Abstract: Systems, methods, tools and computer programming products for implementing a cognitive data lake that selects or recommends operational database based on historically created data lakes storing files having similar file types, categorizations, metadata, and/or frequency of file usage. Selecting the appropriate operational databases is streamlined by building a knowledge base that is accessible during the creation and/or registration of each data lake. The knowledge base maintains historical records of past data lakes, describing each historical data lake's file types, attributes, metadata, frequency of file usage and at least one operational database implemented to manage the files of the historical data lake.Type: ApplicationFiled: November 30, 2018Publication date: June 4, 2020Inventors: Grzegorz P. Szczepanik, Krzysztof A. Rudek, Tomasz Hanusiak, Konrad W. Komnata
-
Publication number: 20200174978Abstract: The present invention generally relates to web applications, and, more particularly, to a distributed virtual control system (VCS) configured to track changes by users to web applications. For this purpose, a system includes a user device configured to access a web server, which includes a web application stored in the web server, wherein the web application is accessible by another user device to make changes to the web application, which changes are stored in a historical collection of versions of the web application in an original repository. The user device is configured to allow the user device to access the historical collection of versions of the web application in the original repository, and to store the changes to the web application made by the other user device in the historical collection of versions of the web application in a first local repository in the user device.Type: ApplicationFiled: December 4, 2018Publication date: June 4, 2020Inventors: Krzysztof RUDEK, Tomasz HANUSIAK, Grzegorz P. SZCZEPANIK, Konrad W. KOMNATA
-
Publication number: 20200134187Abstract: A method and system for improving memory storage and threat detection is provided. The method includes requesting and authorizing permission for executing analysis code for determining if a service device is in compliance with general data protection regulations. In response, executable code is uploaded to the database hardware controller and a first database and a second database is analyzed with respect to patterns associated with the general data protection regulations. Associated results code is generated and transmitted the service device. The results code is executed with respect to the first database and the second database resulting in a storage space increase in the first database and the second database thereby improving operational functions of the first database and the second database.Type: ApplicationFiled: October 24, 2018Publication date: April 30, 2020Inventors: Krzysztof Rudek, Grzegorz P. Szczepanik, Lukasz Jakub Palus, Tomasz Hanusiak
-
Publication number: 20200089814Abstract: A method for detecting software installed on a computer may be provided. The method may comprise obtaining a default user identifier, collecting an installed user identifier, performing an identifier comparison by comparing the installed user identifier with the default user identifier and determining whether an installed user identifier matches a default user identifier, assigning a probability value based on the identifier comparison, performing a threshold comparison of the probability value to the a predetermined threshold value, determining whether the probability value exceeds the threshold value, and in response to determining that the probability value exceeds the threshold value, concluding that the software has been installed on the computer system.Type: ApplicationFiled: September 14, 2018Publication date: March 19, 2020Inventors: Lukasz Jakub Palus, Grzegorz P. Szczepanik, Krzysztof Rudek, Tomasz Hanusiak
-
Publication number: 20200065466Abstract: Approaches presented herein enable restricting access to a locked computing resource in a web browser with a user-tailored CAPTCHA. More specifically, a request for a CAPTCHA is obtained from a web browser of a user attempting to access a resource. A set of terms associated with the user are selected from a pool of terms collected from an environment of the user within a pre-determined time period. A familiarity value of the selected terms indicating a recognizability of the terms by the user is determined. A CAPTCHA of the selected set of terms is generated having a level of graphic noise corresponding to the familiarity value. The generated CAPTCHA is then sent to the web browser. When a response to the CAPTCHA is received from the web browser, it is analyzed to determine whether the response matches the selected set of terms. If so, the web browser is instructed to grant the user access to the resource.Type: ApplicationFiled: August 23, 2018Publication date: February 27, 2020Inventors: Konrad Wojciech Komnata, Grzegorz Piotr Szczepanik, Tomasz Hanusiak, Krzysztof Rudek
-
Publication number: 20200065467Abstract: Approaches presented herein enable restricting access to a locked computing resource in a web browser with a user-tailored CAPTCHA. More specifically, a request for a CAPTCHA is obtained from a web browser of a user attempting to access a resource. A set of terms associated with the user are selected from a pool of terms collected from an environment of the user within a pre-determined time period. A familiarity value of the selected terms indicating a recognizability of the terms by the user is determined. A CAPTCHA of the selected set of terms is generated having a level of graphic noise corresponding to the familiarity value. The generated CAPTCHA is then sent to the web browser. When a response to the CAPTCHA is received from the web browser, it is analyzed to determine whether the response matches the selected set of terms. If so, the web browser is instructed to grant the user access to the resource.Type: ApplicationFiled: July 25, 2019Publication date: February 27, 2020Inventors: Konrad Wojciech Komnata, Grzegorz Piotr Szczepanik, Tomasz Hanusiak, Krzysztof Rudek
-
Publication number: 20200051081Abstract: A computer-implemented method for verifying a transaction in a blockchain network may be provided. The blockchain network comprises nodes participating in performing the transaction. The method comprises grouping the nodes of the blockchain network into a plurality of clusters of nodes. For each cluster, the method comprises determining for each node of the cluster performance parameter values, calculating a weighted sum of the determined performance parameter values, designating the node with the highest weighted sum as cluster leader, designating a number of nodes of the cluster whose weighted sum is next to the highest weighted sum, as sub-cluster leader, the number being at least half of the total number of nodes within said cluster, and verifying the transaction for the cluster by the cluster leader and the sub-cluster leaders.Type: ApplicationFiled: August 7, 2018Publication date: February 13, 2020Inventors: Vinod A. Valecha, Krzysztof Rudek, Markus Blohberger
-
Patent number: 10528452Abstract: A method finding the root cause of errors and/or unexpected behavior of a monitored software application, the method comprising: providing a decision tree corresponding to an error and/or unexpected behavior of a software application, wherein the decision tree comprising multiple nodes, wherein the decision tree further comprising one or more leaf nodes, wherein the leaf nodes indicates at least one reason and one or more possible solutions for the error and/or unexpected behavior; scanning one or more log-files of a software application; determining, based on the decision tree and the scanned log files which step has been not performed by the software application, wherein the non-performed step being indicative for an error and/or unexpected behavior of the software application; determining a leaf node based on the determined non-performed step; extracting information from the leaf node; and providing a reason and/or a solution of the error and/or unexpected behavior.Type: GrantFiled: December 11, 2017Date of Patent: January 7, 2020Assignee: International Business Machines CorporationInventors: Chitra A. Iyer, Angelika Kozuch, Krzysztof Rudek, Vinod A. Valecha
-
Publication number: 20190385195Abstract: Context data pertaining to a target audience to which a product is to be demonstrated can be determined. The target audience can be classified based on the context data. Classifying the target audience can include selecting an audience type out of a predefined plurality of audience types. Customization data can be generated based on the selected audience type. The customization data can be configured to customize demonstration of the product to the target audience.Type: ApplicationFiled: June 15, 2018Publication date: December 19, 2019Inventors: Vinod A. Valecha, Krzysztof Rudek, Markus Blohberger
-
Publication number: 20190258563Abstract: A method for finding the cause of an error or unexpected behavior of a software application includes providing a list of steps to be executed in order to achieve a certain behavior of the application in a usage scenario and providing a decision tree corresponding with the usage scenario. The decision tree comprises decision nodes that correspond with the steps in the sequence of steps to be executed and leaf nodes indicating one or more possible solutions. The method includes scanning log files to determine whether a step in the list of steps to be executed has not been executed and traversing the decision tree when a step in the list of steps has not been executed. A leaf node of the decision tree that corresponds to a non-executed step is determined and a solution is extracted from the determined leaf node.Type: ApplicationFiled: April 30, 2019Publication date: August 22, 2019Inventors: Chitra A. Iyer, Angelika Kozuch, Krzysztof Rudek, Vinod A. Valecha
-
Patent number: 10331542Abstract: A method finding the root cause of errors and/or unexpected behavior of a monitored software application, the method comprising: providing a decision tree corresponding to an error and/or unexpected behavior of a software application, wherein the decision tree comprising multiple nodes, wherein the decision tree further comprising one or more leaf nodes, wherein the leaf nodes indicates at least one reason and one or more possible solutions for the error and/or unexpected behavior; scanning one or more log-files of a software application; determining, based on the decision tree and the scanned log files which step has been not performed by the software application, wherein the non-performed step being indicative for an error and/or unexpected behavior of the software application; determining a leaf node based on the determined non-performed step; extracting information from the leaf node; and providing a reason and/or a solution of the error and/or unexpected behavior.Type: GrantFiled: June 23, 2016Date of Patent: June 25, 2019Assignee: International Business Machines CorporationInventors: Chitra A. Iyer, Angelika Kozuch, Krzysztof Rudek, Vinod A. Valecha
-
Publication number: 20190068630Abstract: A mechanism is provided in a data processing system comprising at least one processor and at least one memory, the at least one memory comprising instructions which are executed by the at least one processor and configure the processor to implement a cognitive security system. The cognitive security system generates a violation array. Each entry of the violation array represents identification of a workflow activity that violates a security policy. Responsive to a new workflow orchestration being created by a user, the cognitive security system compares each activity of the new workflow orchestration to the violation array. Responsive to determining a given activity of the new workflow orchestration exists in the violation array, the cognitive security system recommends to the user to remove the given activity from the new workflow orchestration.Type: ApplicationFiled: August 23, 2017Publication date: February 28, 2019Inventors: Vinod A. Valecha, Krzysztof A. Rudek, Markus Blohberger
-
Publication number: 20180107584Abstract: A method finding the root cause of errors and/or unexpected behavior of a monitored software application, the method comprising: providing a decision tree corresponding to an error and/or unexpected behavior of a software application, wherein the decision tree comprising multiple nodes, wherein the decision tree further comprising one or more leaf nodes, wherein the leaf nodes indicates at least one reason and one or more possible solutions for the error and/or unexpected behavior; scanning one or more log-files of a software application; determining, based on the decision tree and the scanned log files which step has been not performed by the software application, wherein the non-performed step being indicative for an error and/or unexpected behavior of the software application; determining a leaf node based on the determined non-performed step; extracting information from the leaf node; and providing a reason and/or a solution of the error and/or unexpected behavior.Type: ApplicationFiled: December 11, 2017Publication date: April 19, 2018Inventors: Chitra A. Iyer, Angelika Kozuch, Krzysztof Rudek, Vinod A. Valecha
-
Patent number: 9928512Abstract: A system for intelligently determining changes to a service provider user's parameters in the service provider system. The system generally includes a service provider's computer system which contains a computer and a user database stored thereon; a user carried service provider tool, such as an ATM card, a cell phone, and the like; and a remote device whose use by the user is monitored by the service provider, such as an ATM machine (e.g., if the service provider is a bank and the service provider tool is an ATM card) or a phone or cell tower (e.g., if the service provider is a telecommunications service provider and the tool is a cell phone). Activity amongst the computer system, user carried service provider tool, and remote device is wirelessly monitored by the service provider (or an agent of the service provider) in an electronic communications network.Type: GrantFiled: November 25, 2015Date of Patent: March 27, 2018Assignee: International Business Machines CorporationInventors: Pablo R. M. Gonzalez, Tiago Pagani, Krzysztof A. Rudek, Vinod A. Valecha